♫musicjinni

Diffie Hellman | NodeJS | End-to-end Encryption

video thumbnail
In this video you will learn the how to implement #Diffie-Hellman key exchange, to generate a shared secret between two clients, which then can be used to exchange #end-to-end encrypted messages. The implementation is inside a nodejs application, we will be using the #crypto module which is built inside #nodejs.

⭐ Kite is a free AI-powered coding assistant that will help you code faster and smarter. The Kite plugin integrates with all the top editors and IDEs to give you smart completions and documentation while you’re typing. I've been using Kite for 6 months and I love it! https://www.kite.com/get-kite/?utm_medium=referral&utm_source=youtube&utm_campaign=yourstruly&utm_content=description-only

Github(Diffie-Hellman tutorial): https://github.com/trulymittal/diffie-hellman-shared-secret
Diffie–Hellman key exchange(Wiki): https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
MODP DH Groups: https://www.ietf.org/rfc/rfc3526.txt
Wikipedia (primitive root modulo): https://en.wikipedia.org/wiki/Primitive_root_modulo_n

———————————————
Other useful Videos
———————————————
Diffie Hellman analogy: https://youtu.be/JnZQMUL8GcQ
Diffie Hellman Mathematics: https://youtu.be/8Pk8pdHfEy4
Diffie Hellman Nodejs: https://youtu.be/TzOFFV1beTw
Elliptic-Curve Diffie-Hellman (ECDH): https://youtu.be/VV7x4tMxeoI
AES (Advanced Encryption Standard): https://youtu.be/79kuLT5HWs0
ECDH + AES 256 (CBC): https://youtu.be/l5eLUzYzpd8
ECDH + AES 256 GCM (Authenticated Encryption): https://youtu.be/M7M3qeQxTq4


———————————————
Other useful Playlists
———————————————
Docker: https://www.youtube.com/playlist?list=PLdHg5T0SNpN0gFlL8AXvZdAHsvpkuW0Ba
MongoDB: https://www.youtube.com/watch?v=liocKBCVJyw&t=7s
Html/Css/Js: https://www.youtube.com/playlist?list=PLdHg5T0SNpN0saXVT9gfb2MESkiHG8YbP
Android: https://www.youtube.com/playlist?list=PLdHg5T0SNpN2cv8zhK-zQx2qXfJKap9kU
Firebase: https://www.youtube.com/playlist?list=PLdHg5T0SNpN2NimxW3piNqEVBWtXcraz-
Challenges: https://www.youtube.com/playlist?list=PLdHg5T0SNpN20F2v0xYWeLRZtdehexzDi

———————————————
What I use
———————————————
Mouse: https://amzn.to/2O9RJtu
Keyboard: https://amzn.to/2qxajCU
Keyboard 2: https://amzn.to/2XDWH4X
Monitor: https://amzn.to/2pDg7dH
Processor: https://amzn.to/347WWIb
RAM: https://amzn.to/2QEkUqw
Graphics: https://amzn.to/33aBrF4
Microphone: https://amzn.to/2DabdI9

Diffie Hellman | NodeJS | End-to-end Encryption

End-to-end Encryption | Diffie Hellman

ECDH and AES 256 | Encryption and Decryption using Symmetric key | End-to-end Encryption

AES 256 GCM and ECDH | Authenticated Encryption and Decryption | End-to-end Encryption

Protecting Data in Transit using HMAC and Diffie-Hellman in Node.js

End to End Encryption -E2EE Part I (Introduction)

Introduction to Key Exchange (DH and ECDH)

ECDHE with RSA

Security Part2 - Basics of cryptography - 2 TDES, AES, RSA, ECC, DH, ECDH, IES

End-to-end Encryption in Cloud Services • Patrick Linskey • GOTO 2015

Tor Network Key Exchange - Curve25519

Elliptic Curve Diffie-Hellman (ECDH) in Python From Scratch

e-Security Week 5 (Key Exchange)

Elliptic Curve Cryptography: Key Exchange (ECDH), Digital Sig (ECDSA/EdDSA) and Encryption (ECIES)

Understanding end-to-end encryption with JT Olio

Authenticated Key Exchange and Signatures with Tight Security in the Standard Model

Elliptic Curve Cryptography - Monsec (12/4/2021) Sem 1 Week 6

Implement End to End Encryption in Your App in Just 50 Minutes by Henri Binsztok

Messaging layer security: Encrypting a group chat

Throughout Area Optimized Architecture for Elliptic_Curve_Diffie_Hellman protocols

Introduction to CSN11131 (Applied Cryptography and Trust)

Yonatan Mevorach @ NodeTLV '23 | Mastering Cryptography Fundamentals with Node’s crypto module

Asymmetric Cryptography and Elliptic Curves w/ Andrew Burkus

RSA Private & Public Key Encryption in Python

Virgil Security on Firebase end-to-end encryption & HIPAA at GDG San Francisco, by David Szabo

Extended Address

End-to-end encryption for email attachments

Chapter 5 - Basic Cryptography

Not Adding This Technology To Your Rust App Is Irresponsible

SSL/TLS

Disclaimer DMCA